Skip to main content
Log in

Certificateless strong key-insulated signature without random oracles

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

It is important to ensure the private key secure in cryptosystem. To reduce the underlying danger caused by the private key leakage, Dodis et al. (2003) introduced the notion of key-insulated security. To handle the private key leakage problems in certificateless signature schemes, we propose a new certificateless strong key-insulated signature scheme. Our scheme has two desirable properties. First, its security can be proved without utilizing the random oracle model. Second, it solves the key escrow problems in identity-based key-insulated signatures (IBKISs).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology-Crypto 1984. Berlin: Springer-Verlag, 1984: 47–53.

    Google Scholar 

  2. Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C] // Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin: Springer-Verlag, 2003: 452–473.

    Google Scholar 

  3. Dodis Y, Katz J, Xu S, et al. Key-insulated publickey cryptosystems [C]// Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology-Eurocrypt’2002. Berlin: Springer-Verlag, 2002: 65–82.

    Google Scholar 

  4. Dodis Y, Katz J, Xu S, et al. Strong key-insulated signature schemes [C]// Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography. Berlin: Springer-Verlag, 2003: 130–144.

    Google Scholar 

  5. Dodis Y, Yung M. Exposure-resilience for free: The hierarchical ID-based encryption case [C]// Proceedings of the First International IEEE Security in Storage Workshop. Washington, DC, USA: IEEE, 2002: 45–52.

    Google Scholar 

  6. Hanaoka G, Hanaoka Y, Imai H. Parallel keyinsulated public key encryption [C]// Proceedings of the 9th International Conference on Practice and Theory in Public Key Cryptograph: Public Key Cryptography. Berlin: Springer-Verlag, 2006: 105–122.

    Google Scholar 

  7. Hanaoka Y, Hanaoka G, Shikata J, et al. Unconditionally secure key-insulated cryptosystems: models, bounds and constructions [C]// Proceedings of the 4th International Conference on Information and Communications Security. Berlin: Springer-Verlag, 2002: 85–96.

    Google Scholar 

  8. Le Z, Ouyang Y, Ford J, et al. A hierarchical key-insulated signature scheme in the CA trust model[C]// Proceedings of 7th International Conference on Information Security. Berlin: Springer-Verlag, 2004: 280–291.

    Google Scholar 

  9. Weng J, Chen K F, Liu S L, et al. Identity-based key-insulated signature with secure key-updates [C]// Proceedings of the 6th China International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2006: 13–26.

    Google Scholar 

  10. Weng J, Chen K F, Liu S L, et al. Identity-based strong key-insulated signature without random oracles [J]. Jounal of Software, 2008, 19(6): 1555–1564.

    Article  MATH  Google Scholar 

  11. Zhou Y, Cao Z F, Chai Z C. Identity-based key insulated signature [C]// Proceedings of Second International Conference on Information Security Practice and Experience. Berlin: Springer-Verlag, 2006: 226–234.

    Google Scholar 

  12. Bellare M, Palacio A. Protecting against key exposure: strongly key-insulated encryption with optimal threshold [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16(6): 379–396.

    Article  MathSciNet  MATH  Google Scholar 

  13. Canetti R, Goldreich O, Halevi S. The random oracle methodology, revisited [J]. Journal of the ACM, 2004, 51(4): 557–594.

    Article  MathSciNet  MATH  Google Scholar 

  14. Xiong H, Qin Z, Li F. An improved certificateless signature scheme secure in the standard model [J]. Fundamenta Informaticae, 2008, 88(1): 1–14.

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhong-mei Wan  (万中美).

Additional information

Foundation item: the National Natural Science Foundation of China (Nos. 61003215, 61005049, 60903178 and 61103183), the Fundamental Research Funds for the Central Universities (No. 2010B09614) and the Foundation of HoHai University (No. 2084/409265)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wan, Zm., Meng, Xq. & Hong, X. Certificateless strong key-insulated signature without random oracles. J. Shanghai Jiaotong Univ. (Sci.) 16, 571–576 (2011). https://doi.org/10.1007/s12204-011-1191-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-011-1191-7

Key words

CLC number

Navigation